home registration sponsors venue hotels entertainment travel

Eurocrypt 2011 (May 15th-19th, 2011, Tallinn, Estonia)

Preliminary List of Accepted Papers

Title: Almost Optimum t-Cheater Identifiable Secret Sharing Schemes
Authors: Satoshi Obana
Affiliations: NEC

Title: Implementing Gentry's Fully-Homomorphic Encryption Scheme
Authors: Craig Gentry, Shai Halevi
Affiliations: IBM

Title: Adaptive Pseudo-Free Groups and Applications
Authors: Dario Catalano, Dario Fiore and Bogdan Warinschi
Affiliations: University of Catania, ENS Paris and University of Bristol

Title: Key-Dependent Message Security: Generic Amplification and Completeness
Authors: Benny Applebaum
Affiliations: Tel Aviv University

Title: Secure Authentication from a Weak Key, Without Leaking Information
Authors: Niek J. Bouman and Serge Fehr
Affiliations: Centrum Wiskunde & Informatica (CWI), Amsterdam

Title: Semi-Homomorphic Encryption and Multiparty Computation
Authors: Rikke Bendlin, Ivan Damgård, Claudio Orlandi and Sarah Zakarias
Affiliations: Aarhus University

Title: Highly-Efficient Universally-Composable Commitments based on the DDH Assumption
Authors: Yehuda Lindell
Affiliations: Bar-Ilan University

Title: Efficient Authentication from Hard Learning Problems
Authors: Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain and Daniele Venturi
Affiliations: RU Bochum, CWI Amsterdam, UC San Diego, UC Los Angeles, Sapienza Rome

Title: Deniable Encryption with Negligible Detection Probability: An Interactive Construction
Authors: Markus Duermuth and David Mandell Freeman
Affiliations: Ruhr-University Bochum and Stanford University

Title: Commuting Signatures and Verifiable Encryption
Authors: Georg Fuchsbauer
Affiliations: University of Bristol

Title: Unbounded HIBE and Attribute-Based Encryption
Authors: Allison Lewko and Brent Waters
Affiliations: University of Texas at Austin

Title: Domain extension for MACs beyond the birthday barrier
Authors: Yevgeniy Dodis and John Steinberger
Affiliations: NYU and Tsinghua University

Title: Decentralizing Attribute-Based Encryption
Authors: Allison Lewko and Brent Waters
Affiliations: University of Texas at Austin

Title: Tight Proofs for Signature Schemes without Random Oracles
Authors: Sven Schäge
Affiliations: Ruhr-University Bochum

Title: Homomorphic Signatures for Polynomial Functions
Authors: Dan Boneh and David Mandell Freeman
Affiliations: Stanford University

Title: Fully Leakage-Resilient Signatures
Authors: Elette Boyle, Gil Segev and Daniel Wichs
Affiliations: MIT, Microsoft Research Silicon Valley, NYU

Title: Faster Explicit Formulas for Computing Pairings over Ordinary Curves
Authors: Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys and Julio López
Affiliations: University of Campinas, Certicom Research, University of Waterloo, University of Waterloo, University of Campinas

Title: Making NTRU as Secure as Worst-Case Problems over Ideal Lattices
Authors: Damien Stehle and Ron Steinfeld
Affiliations: CNRS, ENS Lyon and Macquarie University

Title: On Linear Hulls, Statistical Saturation Attacks, PRESENT  and a Cryptanalysis of PUFFIN
Authors: Gregor Leander
Affiliations: DTU

Title: Threshold and Revocation Cryptosystems via Extractable Hash Proofs
Authors: Hoeteck Wee
Affiliations: Queens College, CUNY

Title: Secret Keys from Channel Noise
Authors: Hadi Ahmadi and Reihaneh Safavi-Naini
Affiliations: University of Calgary

Title: Concurrent composition in the bounded quantum storage model
Authors: Dominique Unruh
Affiliations: Saarland University

Title: A Formal Study of Power Variability Issues and Side-Channel Attacks for Nanoscale Devices
Authors: Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon, Dina Kamel and Denis Flandre
Affiliations: UCL Crypto Group, Belgium

Title: Pushing the Limits: A Very Compact and a Threshold Implementation of AES
Authors: Amir Moradi, Axel Poschmann, San Ling, Christof Paar and Huaxiong Wang
Affiliations: Ruhr-University Bochum (Moradi, Paar), Nanyang Technological University (Poschmann, Ling, Wang)

Title: Efficient Circuit-Size Independent Public Key Encryption with KDM Security
Authors: Tal Malkin, Isamu Teranishi and Moti Yung
Affiliations: Columbia University (all authors), NEC (Teranishi), Google (Yung)

Title: Careful with Composition: Limitations of the Indifferentiability Framework
Authors: Thomas Ristenpart, Hovav Shacham and Thomas Shrimpton
Affiliations: University of Wisconsin - Madison, UC San Diego, Portland State University

Title: Statistical Attacks on RC4: Distinguishing WPA
Authors: Pouyan Sepehrdad, Serge Vaudenay and Martin Vuagnoux
Affiliations: EPFL

Title: Two-output Secure Computation With Malicious Adversaries
Authors: abhi shelat and Chih-hao Shen
Affiliations: University of Virginia

Title: Towards a Game Theoretic View of Secure Computation
Authors: Gilad Asharov, Ran Canetti and Carmit Hazay
Affiliations: Bar-Ilan University, Tel-Aviv University and Aarhus University

Title: Efficient Non-Interactive Secure Computation
Authors: Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran and Amit Sahai
Affiliations: Technion, Technion, UCLA, UIUC and UCLA

Title: Improved Generic Algorithms for Hard Knapsacks
Authors: Anja Becker, Jean-Sebastien Coron and Antoine Joux
Affiliations: University of Versailles Saint-Quentin-en-Yvelines, University of Luxembourg, University of Versailles Saint-Quentin-en-Yvelines and DGA